Mathway Database - Leaked, Download!
by ShinyHunters - July 27, 2020 at 01:52 PM
#1
Hello RaidForums Community,
Today I have uploaded the Mathway Database for you to download for free, thanks for reading and enjoy!


|Notes|
In January 2020, the math solving website Mathway suffered a data breach that exposed over 25M records. The data was subsequently sold on a dark web marketplace and included names, Google and Facebook IDs, email addresses and salted password hashes.

Compromised data: Device information, Email addresses, First names, Last names, Passwords, Social media profiles, Website activity

ContentsSpoiler
This download consists of 1 .CSV file, the passwords in this are hashed using MD5 then encoded used base64 and lastly stored as hex using bin2hex please look below for data schema. The .7z File's MD5 Hash is C4E8478215B902125A7EC25EB1E2C21F. Total record count of 25865619.
MWemail,MWpassword,MWfirstName,MWlastName,MWuserID,MWSubscriptionType,MWSubscriptionEndDate,MWlastLogin,MWtodayLogins,MWadmin,MWadminMonthly,MWadminAnnual,MWstudent,MWadminID,MWusedPromo,MWstudentStepAccess,MWsignupDate,MWaffiliateCode,MWtotalMobileLogins,MWstepDetail,MWexampleDifficulty,MWroundVar,FBID,MWsignupDevice,MWSubscriptionSource,MWSubscriptionID,MWunsubscribe,MWAnonUserID,MWtestID,GoogleID,Inactive,AppReviewClick,UserRoles,IsAvailable
Downloads Hidden Content
You must register or login to view this content.

Reply
#2
This is the real mathway database, not the fake one with 16M phpass
Reply
#3
Do you know the algo ? or cipher ? @ShinyHunters
Reply
#4
[email protected]:~# php -r 'echo bin2hex(base64_decode("jdHX/1p5uIW2YwZ3dnr5/A=="));'
8dd1d7ff5a79b885b6630677767af9fc

MD5
Reply
#5
thank you for the quality dumps. always a pleasure.
Reply
#6
@ShinyHunters

I tried a few different md5 algos, the ones that worked a bit was md5, md5(strrev($pass)), md5(strrev($pass)) {AVX2}, md5($pass) {AVX2}. (from what I read strrev = reverse so hello = olleh but that didn't work that well either on hashcat -m 0 -r r)

Would be nice if you have the config file or where they stored the hash algo and maybe figure out the algo that way

either way thanks for the leak !
Reply
#7
Another great drop from ShinyHunters. Can't wait for this to be dehashed and converted to user:pass.
Reply
#8
(July 27, 2020 at 07:03 PM)aas002 Wrote: @ShinyHunters

I tried a few different md5 algos, the ones that worked a bit was md5, md5(strrev($pass)), md5(strrev($pass)) {AVX2}, md5($pass) {AVX2}. (from what I read strrev = reverse so hello = olleh but that didn't work that well either on hashcat -m 0 -r r)

Would be nice if you have the config file or where they stored the hash algo and maybe figure out the algo that way

either way thanks for the leak !

Are u find the algo? Pm please if u found
Reply
#9
Nice share! Almost done with cracking the hashes. 800k to go :-)
Reply
#10
(July 29, 2020 at 04:44 PM)Mexx66 Wrote: Nice share! Almost done with cracking the hashes. 800k to go :-)
If you are sharing them, you are a legend! :wow:
Reply
#11
thanks for the share mate.
Reply
#12
thanks for sharing. Best.
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
MySpace Database - Leaked, Download! Omnipotent 266 92,638 1 hour ago
Last Post: Gorgojos
000Webhost Database - Leaked, Download! Loki 517 137,156 1 hour ago
Last Post: Akinori
Facebook Data Leak 533M Records - Leaked, Download! TomLiner 1,397 361,593 1 hour ago
Last Post: rayvsvsba

 Users browsing this thread: 1 Guest(s)